b43: N-PHY: report signal to mac80211
[linux-2.6-block.git] / drivers / net / wireless / mwifiex / scan.c
CommitLineData
5e6e3a92
BZ
1/*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20#include "decl.h"
21#include "ioctl.h"
22#include "util.h"
23#include "fw.h"
24#include "main.h"
25#include "11n.h"
26#include "cfg80211.h"
27
28/* The maximum number of channels the firmware can scan per command */
29#define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
31#define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
32
33/* Memory needed to store a max sized Channel List TLV for a firmware scan */
34#define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
37
38/* Memory needed to store supported rate */
39#define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
41
42/* Memory needed to store a max number/size WildCard SSID TLV for a firmware
43 scan */
44#define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
48
49/* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50#define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
53 + CHAN_TLV_MAX_SIZE \
54 + RATE_TLV_MAX_SIZE \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
56
57
58union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
63};
64
65enum cipher_suite {
66 CIPHER_SUITE_TKIP,
67 CIPHER_SUITE_CCMP,
68 CIPHER_SUITE_MAX
69};
70static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
73};
74static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
77};
78
79/*
80 * This function parses a given IE for a given OUI.
81 *
82 * This is used to parse a WPA/RSN IE to find if it has
83 * a given oui in PTK.
84 */
85static u8
86mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
87{
88 u8 count;
89
90 count = iebody->ptk_cnt[0];
91
92 /* There could be multiple OUIs for PTK hence
93 1) Take the length.
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
96 while (count) {
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
99
100 --count;
101 if (count)
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
104 }
105
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
108}
109
110/*
111 * This function checks if a given OUI is present in a RSN IE.
112 *
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
115 * present.
116 */
117static u8
118mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
119{
270e58e8
YAP
120 u8 *oui;
121 struct ie_body *iebody;
5e6e3a92
BZ
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
123
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
128 RSN_GTK_OUI_OFFSET);
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
131 if (ret)
132 return ret;
133 }
134 return ret;
135}
136
137/*
138 * This function checks if a given OUI is present in a WPA IE.
139 *
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
142 * present.
143 */
144static u8
145mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
146{
270e58e8
YAP
147 u8 *oui;
148 struct ie_body *iebody;
5e6e3a92
BZ
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
150
151 if (((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).
152 vend_hdr.element_id == WLAN_EID_WPA))) {
153 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
154 oui = &mwifiex_wpa_oui[cipher][0];
155 ret = mwifiex_search_oui_in_ie(iebody, oui);
156 if (ret)
157 return ret;
158 }
159 return ret;
160}
161
162/*
163 * This function compares two SSIDs and checks if they match.
164 */
165s32
166mwifiex_ssid_cmp(struct mwifiex_802_11_ssid *ssid1,
167 struct mwifiex_802_11_ssid *ssid2)
168{
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
170 return -1;
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
172}
173
5e6e3a92
BZ
174/*
175 * Sends IOCTL request to start a scan with user configurations.
176 *
177 * This function allocates the IOCTL request buffer, fills it
178 * with requisite parameters and calls the IOCTL handler.
179 *
180 * Upon completion, it also generates a wireless event to notify
181 * applications.
182 */
183int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
184 struct mwifiex_user_scan_cfg *scan_req)
185{
270e58e8 186 int status;
5e6e3a92 187
600f5d90 188 priv->adapter->cmd_wait_q.condition = false;
5e6e3a92 189
600f5d90
AK
190 status = mwifiex_scan_networks(priv, scan_req);
191 if (!status)
192 status = mwifiex_wait_queue_complete(priv->adapter);
5e6e3a92 193
5e6e3a92
BZ
194 return status;
195}
196
197/*
198 * This function checks if wapi is enabled in driver and scanned network is
199 * compatible with it.
200 */
201static bool
202mwifiex_is_network_compatible_for_wapi(struct mwifiex_private *priv,
203 struct mwifiex_bssdescriptor *bss_desc)
204{
205 if (priv->sec_info.wapi_enabled &&
206 (bss_desc->bcn_wapi_ie &&
207 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
208 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
209 return true;
210 }
211 return false;
212}
213
214/*
215 * This function checks if driver is configured with no security mode and
216 * scanned network is compatible with it.
217 */
218static bool
219mwifiex_is_network_compatible_for_no_sec(struct mwifiex_private *priv,
220 struct mwifiex_bssdescriptor *bss_desc)
221{
222 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
223 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
224 && ((!bss_desc->bcn_wpa_ie) ||
225 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
226 WLAN_EID_WPA))
227 && ((!bss_desc->bcn_rsn_ie) ||
228 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
229 WLAN_EID_RSN))
2be50b8d
YAP
230 && !priv->sec_info.encryption_mode
231 && !bss_desc->privacy) {
5e6e3a92
BZ
232 return true;
233 }
234 return false;
235}
236
237/*
238 * This function checks if static WEP is enabled in driver and scanned network
239 * is compatible with it.
240 */
241static bool
242mwifiex_is_network_compatible_for_static_wep(struct mwifiex_private *priv,
243 struct mwifiex_bssdescriptor *bss_desc)
244{
245 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_ENABLED
246 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
247 && bss_desc->privacy) {
248 return true;
249 }
250 return false;
251}
252
253/*
254 * This function checks if wpa is enabled in driver and scanned network is
255 * compatible with it.
256 */
257static bool
258mwifiex_is_network_compatible_for_wpa(struct mwifiex_private *priv,
7c6fa2a8 259 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
260{
261 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
262 && priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
263 && ((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
264 element_id == WLAN_EID_WPA))
265 /*
266 * Privacy bit may NOT be set in some APs like
267 * LinkSys WRT54G && bss_desc->privacy
268 */
269 ) {
7c6fa2a8 270 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
5e6e3a92 271 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 272 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
273 (bss_desc->bcn_wpa_ie) ?
274 (*(bss_desc->bcn_wpa_ie)).
275 vend_hdr.element_id : 0,
276 (bss_desc->bcn_rsn_ie) ?
277 (*(bss_desc->bcn_rsn_ie)).
278 ieee_hdr.element_id : 0,
279 (priv->sec_info.wep_status ==
280 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
281 (priv->sec_info.wpa_enabled) ? "e" : "d",
282 (priv->sec_info.wpa2_enabled) ? "e" : "d",
283 priv->sec_info.encryption_mode,
284 bss_desc->privacy);
285 return true;
286 }
287 return false;
288}
289
290/*
291 * This function checks if wpa2 is enabled in driver and scanned network is
292 * compatible with it.
293 */
294static bool
295mwifiex_is_network_compatible_for_wpa2(struct mwifiex_private *priv,
7c6fa2a8 296 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
297{
298 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
299 && !priv->sec_info.wpa_enabled && priv->sec_info.wpa2_enabled
300 && ((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
301 element_id == WLAN_EID_RSN))
302 /*
303 * Privacy bit may NOT be set in some APs like
304 * LinkSys WRT54G && bss_desc->privacy
305 */
306 ) {
7c6fa2a8 307 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
5e6e3a92 308 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 309 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
310 (bss_desc->bcn_wpa_ie) ?
311 (*(bss_desc->bcn_wpa_ie)).
312 vend_hdr.element_id : 0,
313 (bss_desc->bcn_rsn_ie) ?
314 (*(bss_desc->bcn_rsn_ie)).
315 ieee_hdr.element_id : 0,
316 (priv->sec_info.wep_status ==
317 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
318 (priv->sec_info.wpa_enabled) ? "e" : "d",
319 (priv->sec_info.wpa2_enabled) ? "e" : "d",
320 priv->sec_info.encryption_mode,
321 bss_desc->privacy);
322 return true;
323 }
324 return false;
325}
326
327/*
328 * This function checks if adhoc AES is enabled in driver and scanned network is
329 * compatible with it.
330 */
331static bool
332mwifiex_is_network_compatible_for_adhoc_aes(struct mwifiex_private *priv,
333 struct mwifiex_bssdescriptor *bss_desc)
334{
335 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
336 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
337 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
338 element_id != WLAN_EID_WPA))
339 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
340 element_id != WLAN_EID_RSN))
2be50b8d
YAP
341 && !priv->sec_info.encryption_mode
342 && bss_desc->privacy) {
5e6e3a92
BZ
343 return true;
344 }
345 return false;
346}
347
348/*
349 * This function checks if dynamic WEP is enabled in driver and scanned network
350 * is compatible with it.
351 */
352static bool
353mwifiex_is_network_compatible_for_dynamic_wep(struct mwifiex_private *priv,
7c6fa2a8 354 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
355{
356 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
357 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
358 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
359 element_id != WLAN_EID_WPA))
360 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
361 element_id != WLAN_EID_RSN))
2be50b8d
YAP
362 && priv->sec_info.encryption_mode
363 && bss_desc->privacy) {
5e6e3a92 364 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
7c6fa2a8 365 "WEP: wpa_ie=%#x wpa2_ie=%#x "
5e6e3a92 366 "EncMode=%#x privacy=%#x\n",
7c6fa2a8 367 __func__,
5e6e3a92
BZ
368 (bss_desc->bcn_wpa_ie) ?
369 (*(bss_desc->bcn_wpa_ie)).
370 vend_hdr.element_id : 0,
371 (bss_desc->bcn_rsn_ie) ?
372 (*(bss_desc->bcn_rsn_ie)).
373 ieee_hdr.element_id : 0,
374 priv->sec_info.encryption_mode,
375 bss_desc->privacy);
376 return true;
377 }
378 return false;
379}
380
381/*
382 * This function checks if a scanned network is compatible with the driver
383 * settings.
384 *
385 * WEP WPA WPA2 ad-hoc encrypt Network
386 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
387 * 0 0 0 0 NONE 0 0 0 yes No security
388 * 0 1 0 0 x 1x 1 x yes WPA (disable
389 * HT if no AES)
390 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
391 * HT if no AES)
392 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
393 * 1 0 0 0 NONE 1 0 0 yes Static WEP
394 * (disable HT)
395 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
396 *
397 * Compatibility is not matched while roaming, except for mode.
398 */
399static s32
7c6fa2a8
AK
400mwifiex_is_network_compatible(struct mwifiex_private *priv,
401 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
5e6e3a92
BZ
402{
403 struct mwifiex_adapter *adapter = priv->adapter;
5e6e3a92 404
5e6e3a92
BZ
405 bss_desc->disable_11n = false;
406
407 /* Don't check for compatibility if roaming */
eecd8250
BZ
408 if (priv->media_connected && (priv->bss_mode == NL80211_IFTYPE_STATION)
409 && (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
7c6fa2a8 410 return 0;
5e6e3a92
BZ
411
412 if (priv->wps.session_enable) {
413 dev_dbg(adapter->dev,
414 "info: return success directly in WPS period\n");
7c6fa2a8 415 return 0;
5e6e3a92
BZ
416 }
417
418 if (mwifiex_is_network_compatible_for_wapi(priv, bss_desc)) {
419 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
7c6fa2a8 420 return 0;
5e6e3a92
BZ
421 }
422
423 if (bss_desc->bss_mode == mode) {
424 if (mwifiex_is_network_compatible_for_no_sec(priv, bss_desc)) {
425 /* No security */
7c6fa2a8 426 return 0;
5e6e3a92
BZ
427 } else if (mwifiex_is_network_compatible_for_static_wep(priv,
428 bss_desc)) {
429 /* Static WEP enabled */
430 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
431 bss_desc->disable_11n = true;
7c6fa2a8
AK
432 return 0;
433 } else if (mwifiex_is_network_compatible_for_wpa(priv,
434 bss_desc)) {
5e6e3a92
BZ
435 /* WPA enabled */
436 if (((priv->adapter->config_bands & BAND_GN
437 || priv->adapter->config_bands & BAND_AN)
438 && bss_desc->bcn_ht_cap)
439 && !mwifiex_is_wpa_oui_present(bss_desc,
440 CIPHER_SUITE_CCMP)) {
441
442 if (mwifiex_is_wpa_oui_present(bss_desc,
443 CIPHER_SUITE_TKIP)) {
444 dev_dbg(adapter->dev,
445 "info: Disable 11n if AES "
446 "is not supported by AP\n");
447 bss_desc->disable_11n = true;
448 } else {
449 return -1;
450 }
451 }
7c6fa2a8 452 return 0;
5e6e3a92 453 } else if (mwifiex_is_network_compatible_for_wpa2(priv,
7c6fa2a8 454 bss_desc)) {
5e6e3a92
BZ
455 /* WPA2 enabled */
456 if (((priv->adapter->config_bands & BAND_GN
457 || priv->adapter->config_bands & BAND_AN)
458 && bss_desc->bcn_ht_cap)
459 && !mwifiex_is_rsn_oui_present(bss_desc,
460 CIPHER_SUITE_CCMP)) {
461
462 if (mwifiex_is_rsn_oui_present(bss_desc,
463 CIPHER_SUITE_TKIP)) {
464 dev_dbg(adapter->dev,
465 "info: Disable 11n if AES "
466 "is not supported by AP\n");
467 bss_desc->disable_11n = true;
468 } else {
469 return -1;
470 }
471 }
7c6fa2a8 472 return 0;
5e6e3a92
BZ
473 } else if (mwifiex_is_network_compatible_for_adhoc_aes(priv,
474 bss_desc)) {
475 /* Ad-hoc AES enabled */
7c6fa2a8 476 return 0;
5e6e3a92 477 } else if (mwifiex_is_network_compatible_for_dynamic_wep(priv,
7c6fa2a8 478 bss_desc)) {
5e6e3a92 479 /* Dynamic WEP enabled */
7c6fa2a8 480 return 0;
5e6e3a92
BZ
481 }
482
483 /* Security doesn't match */
7c6fa2a8 484 dev_dbg(adapter->dev, "info: %s: failed: "
5e6e3a92
BZ
485 "wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s EncMode"
486 "=%#x privacy=%#x\n",
7c6fa2a8 487 __func__,
5e6e3a92
BZ
488 (bss_desc->bcn_wpa_ie) ?
489 (*(bss_desc->bcn_wpa_ie)).vend_hdr.
490 element_id : 0,
491 (bss_desc->bcn_rsn_ie) ?
492 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.
493 element_id : 0,
494 (priv->sec_info.wep_status ==
495 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
496 (priv->sec_info.wpa_enabled) ? "e" : "d",
497 (priv->sec_info.wpa2_enabled) ? "e" : "d",
498 priv->sec_info.encryption_mode, bss_desc->privacy);
499 return -1;
500 }
501
502 /* Mode doesn't match */
503 return -1;
504}
505
5e6e3a92
BZ
506/*
507 * This function creates a channel list for the driver to scan, based
508 * on region/band information.
509 *
510 * This routine is used for any scan that is not provided with a
511 * specific channel list to scan.
512 */
513static void
514mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
515 const struct mwifiex_user_scan_cfg
516 *user_scan_in,
517 struct mwifiex_chan_scan_param_set
518 *scan_chan_list,
519 u8 filtered_scan)
520{
521 enum ieee80211_band band;
522 struct ieee80211_supported_band *sband;
523 struct ieee80211_channel *ch;
524 struct mwifiex_adapter *adapter = priv->adapter;
525 int chan_idx = 0, i;
526 u8 scan_type;
527
528 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
529
530 if (!priv->wdev->wiphy->bands[band])
531 continue;
532
533 sband = priv->wdev->wiphy->bands[band];
534
d06b7b9e 535 for (i = 0; (i < sband->n_channels) ; i++) {
5e6e3a92
BZ
536 ch = &sband->channels[i];
537 if (ch->flags & IEEE80211_CHAN_DISABLED)
538 continue;
539 scan_chan_list[chan_idx].radio_type = band;
540 scan_type = ch->flags & IEEE80211_CHAN_PASSIVE_SCAN;
541 if (user_scan_in &&
542 user_scan_in->chan_list[0].scan_time)
543 scan_chan_list[chan_idx].max_scan_time =
544 cpu_to_le16((u16) user_scan_in->
545 chan_list[0].scan_time);
546 else if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
547 scan_chan_list[chan_idx].max_scan_time =
548 cpu_to_le16(adapter->passive_scan_time);
549 else
550 scan_chan_list[chan_idx].max_scan_time =
551 cpu_to_le16(adapter->active_scan_time);
552 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
553 scan_chan_list[chan_idx].chan_scan_mode_bitmap
554 |= MWIFIEX_PASSIVE_SCAN;
555 else
556 scan_chan_list[chan_idx].chan_scan_mode_bitmap
557 &= ~MWIFIEX_PASSIVE_SCAN;
558 scan_chan_list[chan_idx].chan_number =
559 (u32) ch->hw_value;
560 if (filtered_scan) {
561 scan_chan_list[chan_idx].max_scan_time =
562 cpu_to_le16(adapter->specific_scan_time);
563 scan_chan_list[chan_idx].chan_scan_mode_bitmap
564 |= MWIFIEX_DISABLE_CHAN_FILT;
565 }
d06b7b9e 566 chan_idx++;
5e6e3a92
BZ
567 }
568
569 }
570}
571
572/*
573 * This function constructs and sends multiple scan config commands to
574 * the firmware.
575 *
576 * Previous routines in the code flow have created a scan command configuration
577 * with any requested TLVs. This function splits the channel TLV into maximum
578 * channels supported per scan lists and sends the portion of the channel TLV,
579 * along with the other TLVs, to the firmware.
580 */
581static int
600f5d90 582mwifiex_scan_channel_list(struct mwifiex_private *priv,
5e6e3a92
BZ
583 u32 max_chan_per_scan, u8 filtered_scan,
584 struct mwifiex_scan_cmd_config *scan_cfg_out,
585 struct mwifiex_ie_types_chan_list_param_set
586 *chan_tlv_out,
587 struct mwifiex_chan_scan_param_set *scan_chan_list)
588{
589 int ret = 0;
590 struct mwifiex_chan_scan_param_set *tmp_chan_list;
591 struct mwifiex_chan_scan_param_set *start_chan;
592
593 u32 tlv_idx;
594 u32 total_scan_time;
595 u32 done_early;
596
597 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
598 dev_dbg(priv->adapter->dev,
599 "info: Scan: Null detect: %p, %p, %p\n",
600 scan_cfg_out, chan_tlv_out, scan_chan_list);
601 return -1;
602 }
603
604 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
605
606 /* Set the temp channel struct pointer to the start of the desired
607 list */
608 tmp_chan_list = scan_chan_list;
609
610 /* Loop through the desired channel list, sending a new firmware scan
611 commands for each max_chan_per_scan channels (or for 1,6,11
612 individually if configured accordingly) */
613 while (tmp_chan_list->chan_number) {
614
615 tlv_idx = 0;
616 total_scan_time = 0;
617 chan_tlv_out->header.len = 0;
618 start_chan = tmp_chan_list;
619 done_early = false;
620
621 /*
622 * Construct the Channel TLV for the scan command. Continue to
623 * insert channel TLVs until:
624 * - the tlv_idx hits the maximum configured per scan command
625 * - the next channel to insert is 0 (end of desired channel
626 * list)
627 * - done_early is set (controlling individual scanning of
628 * 1,6,11)
629 */
630 while (tlv_idx < max_chan_per_scan
631 && tmp_chan_list->chan_number && !done_early) {
632
633 dev_dbg(priv->adapter->dev,
634 "info: Scan: Chan(%3d), Radio(%d),"
635 " Mode(%d, %d), Dur(%d)\n",
636 tmp_chan_list->chan_number,
637 tmp_chan_list->radio_type,
638 tmp_chan_list->chan_scan_mode_bitmap
639 & MWIFIEX_PASSIVE_SCAN,
640 (tmp_chan_list->chan_scan_mode_bitmap
641 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
642 le16_to_cpu(tmp_chan_list->max_scan_time));
643
644 /* Copy the current channel TLV to the command being
645 prepared */
646 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
647 tmp_chan_list,
648 sizeof(chan_tlv_out->chan_scan_param));
649
650 /* Increment the TLV header length by the size
651 appended */
652 chan_tlv_out->header.len =
653 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
654 (sizeof(chan_tlv_out->chan_scan_param)));
655
656 /*
657 * The tlv buffer length is set to the number of bytes
658 * of the between the channel tlv pointer and the start
659 * of the tlv buffer. This compensates for any TLVs
660 * that were appended before the channel list.
661 */
662 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
663 scan_cfg_out->tlv_buf);
664
665 /* Add the size of the channel tlv header and the data
666 length */
667 scan_cfg_out->tlv_buf_len +=
668 (sizeof(chan_tlv_out->header)
669 + le16_to_cpu(chan_tlv_out->header.len));
670
671 /* Increment the index to the channel tlv we are
672 constructing */
673 tlv_idx++;
674
675 /* Count the total scan time per command */
676 total_scan_time +=
677 le16_to_cpu(tmp_chan_list->max_scan_time);
678
679 done_early = false;
680
681 /* Stop the loop if the *current* channel is in the
682 1,6,11 set and we are not filtering on a BSSID
683 or SSID. */
684 if (!filtered_scan && (tmp_chan_list->chan_number == 1
685 || tmp_chan_list->chan_number == 6
686 || tmp_chan_list->chan_number == 11))
687 done_early = true;
688
689 /* Increment the tmp pointer to the next channel to
690 be scanned */
691 tmp_chan_list++;
692
693 /* Stop the loop if the *next* channel is in the 1,6,11
694 set. This will cause it to be the only channel
695 scanned on the next interation */
696 if (!filtered_scan && (tmp_chan_list->chan_number == 1
697 || tmp_chan_list->chan_number == 6
698 || tmp_chan_list->chan_number == 11))
699 done_early = true;
700 }
701
702 /* The total scan time should be less than scan command timeout
703 value */
704 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
705 dev_err(priv->adapter->dev, "total scan time %dms"
706 " is over limit (%dms), scan skipped\n",
707 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
708 ret = -1;
709 break;
710 }
711
712 priv->adapter->scan_channels = start_chan;
713
714 /* Send the scan command to the firmware with the specified
715 cfg */
600f5d90
AK
716 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
717 HostCmd_ACT_GEN_SET, 0,
718 scan_cfg_out);
5e6e3a92
BZ
719 if (ret)
720 break;
721 }
722
723 if (ret)
724 return -1;
725
726 return 0;
727}
728
729/*
730 * This function constructs a scan command configuration structure to use
731 * in scan commands.
732 *
733 * Application layer or other functions can invoke network scanning
734 * with a scan configuration supplied in a user scan configuration structure.
735 * This structure is used as the basis of one or many scan command configuration
736 * commands that are sent to the command processing module and eventually to the
737 * firmware.
738 *
739 * This function creates a scan command configuration structure based on the
740 * following user supplied parameters (if present):
741 * - SSID filter
742 * - BSSID filter
743 * - Number of Probes to be sent
744 * - Channel list
745 *
746 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
747 * If the number of probes is not set, adapter default setting is used.
748 */
749static void
750mwifiex_scan_setup_scan_config(struct mwifiex_private *priv,
751 const struct mwifiex_user_scan_cfg *user_scan_in,
752 struct mwifiex_scan_cmd_config *scan_cfg_out,
753 struct mwifiex_ie_types_chan_list_param_set
754 **chan_list_out,
755 struct mwifiex_chan_scan_param_set
756 *scan_chan_list,
757 u8 *max_chan_per_scan, u8 *filtered_scan,
758 u8 *scan_current_only)
759{
760 struct mwifiex_adapter *adapter = priv->adapter;
761 struct mwifiex_ie_types_num_probes *num_probes_tlv;
762 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
763 struct mwifiex_ie_types_rates_param_set *rates_tlv;
764 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
765 u8 *tlv_pos;
766 u32 num_probes;
767 u32 ssid_len;
768 u32 chan_idx;
769 u32 scan_type;
770 u16 scan_dur;
771 u8 channel;
772 u8 radio_type;
773 u32 ssid_idx;
774 u8 ssid_filter;
775 u8 rates[MWIFIEX_SUPPORTED_RATES];
776 u32 rates_size;
777 struct mwifiex_ie_types_htcap *ht_cap;
778
779 /* The tlv_buf_len is calculated for each scan command. The TLVs added
780 in this routine will be preserved since the routine that sends the
781 command will append channelTLVs at *chan_list_out. The difference
782 between the *chan_list_out and the tlv_buf start will be used to
783 calculate the size of anything we add in this routine. */
784 scan_cfg_out->tlv_buf_len = 0;
785
786 /* Running tlv pointer. Assigned to chan_list_out at end of function
787 so later routines know where channels can be added to the command
788 buf */
789 tlv_pos = scan_cfg_out->tlv_buf;
790
791 /* Initialize the scan as un-filtered; the flag is later set to TRUE
792 below if a SSID or BSSID filter is sent in the command */
793 *filtered_scan = false;
794
795 /* Initialize the scan as not being only on the current channel. If
796 the channel list is customized, only contains one channel, and is
797 the active channel, this is set true and data flow is not halted. */
798 *scan_current_only = false;
799
800 if (user_scan_in) {
801
802 /* Default the ssid_filter flag to TRUE, set false under
803 certain wildcard conditions and qualified by the existence
804 of an SSID list before marking the scan as filtered */
805 ssid_filter = true;
806
807 /* Set the BSS type scan filter, use Adapter setting if
808 unset */
809 scan_cfg_out->bss_mode =
810 (user_scan_in->bss_mode ? (u8) user_scan_in->
811 bss_mode : (u8) adapter->scan_mode);
812
813 /* Set the number of probes to send, use Adapter setting
814 if unset */
815 num_probes =
816 (user_scan_in->num_probes ? user_scan_in->
817 num_probes : adapter->scan_probes);
818
819 /*
820 * Set the BSSID filter to the incoming configuration,
821 * if non-zero. If not set, it will remain disabled
822 * (all zeros).
823 */
824 memcpy(scan_cfg_out->specific_bssid,
825 user_scan_in->specific_bssid,
826 sizeof(scan_cfg_out->specific_bssid));
827
828 for (ssid_idx = 0;
829 ((ssid_idx < ARRAY_SIZE(user_scan_in->ssid_list))
830 && (*user_scan_in->ssid_list[ssid_idx].ssid
831 || user_scan_in->ssid_list[ssid_idx].max_len));
832 ssid_idx++) {
833
834 ssid_len = strlen(user_scan_in->ssid_list[ssid_idx].
835 ssid) + 1;
836
837 wildcard_ssid_tlv =
838 (struct mwifiex_ie_types_wildcard_ssid_params *)
839 tlv_pos;
840 wildcard_ssid_tlv->header.type =
841 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
842 wildcard_ssid_tlv->header.len = cpu_to_le16(
843 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
844 max_ssid_length)));
845 wildcard_ssid_tlv->max_ssid_length =
846 user_scan_in->ssid_list[ssid_idx].max_len;
847
848 memcpy(wildcard_ssid_tlv->ssid,
849 user_scan_in->ssid_list[ssid_idx].ssid,
850 ssid_len);
851
852 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
853 + le16_to_cpu(wildcard_ssid_tlv->header.len));
854
855 dev_dbg(adapter->dev, "info: scan: ssid_list[%d]: %s, %d\n",
856 ssid_idx, wildcard_ssid_tlv->ssid,
857 wildcard_ssid_tlv->max_ssid_length);
858
859 /* Empty wildcard ssid with a maxlen will match many or
860 potentially all SSIDs (maxlen == 32), therefore do
861 not treat the scan as
862 filtered. */
863 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
864 ssid_filter = false;
865
866 }
867
868 /*
869 * The default number of channels sent in the command is low to
870 * ensure the response buffer from the firmware does not
871 * truncate scan results. That is not an issue with an SSID
872 * or BSSID filter applied to the scan results in the firmware.
873 */
874 if ((ssid_idx && ssid_filter)
875 || memcmp(scan_cfg_out->specific_bssid, &zero_mac,
876 sizeof(zero_mac)))
877 *filtered_scan = true;
878 } else {
879 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
880 num_probes = adapter->scan_probes;
881 }
882
883 /*
884 * If a specific BSSID or SSID is used, the number of channels in the
885 * scan command will be increased to the absolute maximum.
886 */
887 if (*filtered_scan)
888 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
889 else
890 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
891
892 /* If the input config or adapter has the number of Probes set,
893 add tlv */
894 if (num_probes) {
895
896 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
897 num_probes);
898
899 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
900 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
901 num_probes_tlv->header.len =
902 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
903 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
904
905 tlv_pos += sizeof(num_probes_tlv->header) +
906 le16_to_cpu(num_probes_tlv->header.len);
907
908 }
909
910 /* Append rates tlv */
911 memset(rates, 0, sizeof(rates));
912
913 rates_size = mwifiex_get_supported_rates(priv, rates);
914
915 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
916 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
917 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
918 memcpy(rates_tlv->rates, rates, rates_size);
919 tlv_pos += sizeof(rates_tlv->header) + rates_size;
920
921 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
922
923 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)
924 && (priv->adapter->config_bands & BAND_GN
925 || priv->adapter->config_bands & BAND_AN)) {
926 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
927 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
928 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
929 ht_cap->header.len =
930 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
a46b7b5c
AK
931 radio_type =
932 mwifiex_band_to_radio_type(priv->adapter->config_bands);
933 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
5e6e3a92
BZ
934 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
935 }
936
937 /* Append vendor specific IE TLV */
938 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
939
940 /*
941 * Set the output for the channel TLV to the address in the tlv buffer
942 * past any TLVs that were added in this function (SSID, num_probes).
943 * Channel TLVs will be added past this for each scan command,
944 * preserving the TLVs that were previously added.
945 */
946 *chan_list_out =
947 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
948
949 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
950
951 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
952
953 for (chan_idx = 0;
954 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX
955 && user_scan_in->chan_list[chan_idx].chan_number;
956 chan_idx++) {
957
958 channel = user_scan_in->chan_list[chan_idx].chan_number;
959 (scan_chan_list + chan_idx)->chan_number = channel;
960
961 radio_type =
962 user_scan_in->chan_list[chan_idx].radio_type;
963 (scan_chan_list + chan_idx)->radio_type = radio_type;
964
965 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
966
967 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
968 (scan_chan_list +
969 chan_idx)->chan_scan_mode_bitmap
970 |= MWIFIEX_PASSIVE_SCAN;
971 else
972 (scan_chan_list +
973 chan_idx)->chan_scan_mode_bitmap
974 &= ~MWIFIEX_PASSIVE_SCAN;
975
976 if (user_scan_in->chan_list[chan_idx].scan_time) {
977 scan_dur = (u16) user_scan_in->
978 chan_list[chan_idx].scan_time;
979 } else {
980 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
981 scan_dur = adapter->passive_scan_time;
982 else if (*filtered_scan)
983 scan_dur = adapter->specific_scan_time;
984 else
985 scan_dur = adapter->active_scan_time;
986 }
987
988 (scan_chan_list + chan_idx)->min_scan_time =
989 cpu_to_le16(scan_dur);
990 (scan_chan_list + chan_idx)->max_scan_time =
991 cpu_to_le16(scan_dur);
992 }
993
994 /* Check if we are only scanning the current channel */
995 if ((chan_idx == 1)
996 && (user_scan_in->chan_list[0].chan_number
997 == priv->curr_bss_params.bss_descriptor.channel)) {
998 *scan_current_only = true;
999 dev_dbg(adapter->dev,
1000 "info: Scan: Scanning current channel only\n");
1001 }
1002
1003 } else {
1004 dev_dbg(adapter->dev,
1005 "info: Scan: Creating full region channel list\n");
1006 mwifiex_scan_create_channel_list(priv, user_scan_in,
1007 scan_chan_list,
1008 *filtered_scan);
1009 }
1010}
1011
1012/*
1013 * This function inspects the scan response buffer for pointers to
1014 * expected TLVs.
1015 *
1016 * TLVs can be included at the end of the scan response BSS information.
1017 *
1018 * Data in the buffer is parsed pointers to TLVs that can potentially
1019 * be passed back in the response.
1020 */
1021static void
1022mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1023 struct mwifiex_ie_types_data *tlv,
1024 u32 tlv_buf_size, u32 req_tlv_type,
1025 struct mwifiex_ie_types_data **tlv_data)
1026{
1027 struct mwifiex_ie_types_data *current_tlv;
1028 u32 tlv_buf_left;
1029 u32 tlv_type;
1030 u32 tlv_len;
1031
1032 current_tlv = tlv;
1033 tlv_buf_left = tlv_buf_size;
1034 *tlv_data = NULL;
1035
1036 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1037 tlv_buf_size);
1038
1039 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1040
1041 tlv_type = le16_to_cpu(current_tlv->header.type);
1042 tlv_len = le16_to_cpu(current_tlv->header.len);
1043
1044 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1045 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1046 break;
1047 }
1048
1049 if (req_tlv_type == tlv_type) {
1050 switch (tlv_type) {
1051 case TLV_TYPE_TSFTIMESTAMP:
1052 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1053 "timestamp TLV, len = %d\n", tlv_len);
1054 *tlv_data = (struct mwifiex_ie_types_data *)
1055 current_tlv;
1056 break;
1057 case TLV_TYPE_CHANNELBANDLIST:
1058 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1059 " band list TLV, len = %d\n", tlv_len);
1060 *tlv_data = (struct mwifiex_ie_types_data *)
1061 current_tlv;
1062 break;
1063 default:
1064 dev_err(adapter->dev,
1065 "SCAN_RESP: unhandled TLV = %d\n",
1066 tlv_type);
1067 /* Give up, this seems corrupted */
1068 return;
1069 }
1070 }
1071
1072 if (*tlv_data)
1073 break;
1074
1075
1076 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1077 current_tlv =
1078 (struct mwifiex_ie_types_data *) (current_tlv->data +
1079 tlv_len);
1080
1081 } /* while */
1082}
1083
1084/*
7c6fa2a8
AK
1085 * This function parses provided beacon buffer and updates
1086 * respective fields in bss descriptor structure.
5e6e3a92 1087 */
7c6fa2a8
AK
1088int
1089mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1090 struct mwifiex_bssdescriptor *bss_entry,
1091 u8 *ie_buf, u32 ie_len)
5e6e3a92
BZ
1092{
1093 int ret = 0;
1094 u8 element_id;
1095 struct ieee_types_fh_param_set *fh_param_set;
1096 struct ieee_types_ds_param_set *ds_param_set;
1097 struct ieee_types_cf_param_set *cf_param_set;
1098 struct ieee_types_ibss_param_set *ibss_param_set;
5e6e3a92
BZ
1099 u8 *current_ptr;
1100 u8 *rate;
1101 u8 element_len;
1102 u16 total_ie_len;
1103 u8 bytes_to_copy;
1104 u8 rate_size;
5e6e3a92 1105 u8 found_data_rate_ie;
7c6fa2a8 1106 u32 bytes_left;
5e6e3a92
BZ
1107 struct ieee_types_vendor_specific *vendor_ie;
1108 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1109 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1110
1111 found_data_rate_ie = false;
1112 rate_size = 0;
7c6fa2a8
AK
1113 current_ptr = ie_buf;
1114 bytes_left = ie_len;
1115 bss_entry->beacon_buf = ie_buf;
1116 bss_entry->beacon_buf_size = ie_len;
5e6e3a92
BZ
1117
1118 /* Process variable IE */
7c6fa2a8 1119 while (bytes_left >= 2) {
5e6e3a92
BZ
1120 element_id = *current_ptr;
1121 element_len = *(current_ptr + 1);
1122 total_ie_len = element_len + sizeof(struct ieee_types_header);
1123
7c6fa2a8 1124 if (bytes_left < total_ie_len) {
5e6e3a92
BZ
1125 dev_err(adapter->dev, "err: InterpretIE: in processing"
1126 " IE, bytes left < IE length\n");
7c6fa2a8 1127 return -1;
5e6e3a92
BZ
1128 }
1129 switch (element_id) {
1130 case WLAN_EID_SSID:
1131 bss_entry->ssid.ssid_len = element_len;
1132 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1133 element_len);
7c6fa2a8
AK
1134 dev_dbg(adapter->dev, "info: InterpretIE: ssid: "
1135 "%-32s\n", bss_entry->ssid.ssid);
5e6e3a92
BZ
1136 break;
1137
1138 case WLAN_EID_SUPP_RATES:
1139 memcpy(bss_entry->data_rates, current_ptr + 2,
1140 element_len);
1141 memcpy(bss_entry->supported_rates, current_ptr + 2,
1142 element_len);
1143 rate_size = element_len;
1144 found_data_rate_ie = true;
1145 break;
1146
1147 case WLAN_EID_FH_PARAMS:
1148 fh_param_set =
1149 (struct ieee_types_fh_param_set *) current_ptr;
1150 memcpy(&bss_entry->phy_param_set.fh_param_set,
1151 fh_param_set,
1152 sizeof(struct ieee_types_fh_param_set));
1153 break;
1154
1155 case WLAN_EID_DS_PARAMS:
1156 ds_param_set =
1157 (struct ieee_types_ds_param_set *) current_ptr;
1158
1159 bss_entry->channel = ds_param_set->current_chan;
1160
1161 memcpy(&bss_entry->phy_param_set.ds_param_set,
1162 ds_param_set,
1163 sizeof(struct ieee_types_ds_param_set));
1164 break;
1165
1166 case WLAN_EID_CF_PARAMS:
1167 cf_param_set =
1168 (struct ieee_types_cf_param_set *) current_ptr;
1169 memcpy(&bss_entry->ss_param_set.cf_param_set,
1170 cf_param_set,
1171 sizeof(struct ieee_types_cf_param_set));
1172 break;
1173
1174 case WLAN_EID_IBSS_PARAMS:
1175 ibss_param_set =
1176 (struct ieee_types_ibss_param_set *)
1177 current_ptr;
1178 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1179 ibss_param_set,
1180 sizeof(struct ieee_types_ibss_param_set));
1181 break;
1182
1183 case WLAN_EID_ERP_INFO:
1184 bss_entry->erp_flags = *(current_ptr + 2);
1185 break;
1186
1187 case WLAN_EID_EXT_SUPP_RATES:
1188 /*
1189 * Only process extended supported rate
1190 * if data rate is already found.
1191 * Data rate IE should come before
1192 * extended supported rate IE
1193 */
1194 if (found_data_rate_ie) {
1195 if ((element_len + rate_size) >
1196 MWIFIEX_SUPPORTED_RATES)
1197 bytes_to_copy =
1198 (MWIFIEX_SUPPORTED_RATES -
1199 rate_size);
1200 else
1201 bytes_to_copy = element_len;
1202
1203 rate = (u8 *) bss_entry->data_rates;
1204 rate += rate_size;
1205 memcpy(rate, current_ptr + 2, bytes_to_copy);
1206
1207 rate = (u8 *) bss_entry->supported_rates;
1208 rate += rate_size;
1209 memcpy(rate, current_ptr + 2, bytes_to_copy);
1210 }
1211 break;
1212
1213 case WLAN_EID_VENDOR_SPECIFIC:
1214 vendor_ie = (struct ieee_types_vendor_specific *)
1215 current_ptr;
1216
1217 if (!memcmp
1218 (vendor_ie->vend_hdr.oui, wpa_oui,
1219 sizeof(wpa_oui))) {
1220 bss_entry->bcn_wpa_ie =
1221 (struct ieee_types_vendor_specific *)
1222 current_ptr;
1223 bss_entry->wpa_offset = (u16) (current_ptr -
1224 bss_entry->beacon_buf);
1225 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1226 sizeof(wmm_oui))) {
1227 if (total_ie_len ==
1228 sizeof(struct ieee_types_wmm_parameter)
1229 || total_ie_len ==
1230 sizeof(struct ieee_types_wmm_info))
1231 /*
1232 * Only accept and copy the WMM IE if
1233 * it matches the size expected for the
1234 * WMM Info IE or the WMM Parameter IE.
1235 */
1236 memcpy((u8 *) &bss_entry->wmm_ie,
1237 current_ptr, total_ie_len);
1238 }
1239 break;
1240 case WLAN_EID_RSN:
1241 bss_entry->bcn_rsn_ie =
1242 (struct ieee_types_generic *) current_ptr;
1243 bss_entry->rsn_offset = (u16) (current_ptr -
1244 bss_entry->beacon_buf);
1245 break;
1246 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1247 bss_entry->bcn_wapi_ie =
1248 (struct ieee_types_generic *) current_ptr;
1249 bss_entry->wapi_offset = (u16) (current_ptr -
1250 bss_entry->beacon_buf);
1251 break;
1252 case WLAN_EID_HT_CAPABILITY:
1253 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1254 (current_ptr +
1255 sizeof(struct ieee_types_header));
1256 bss_entry->ht_cap_offset = (u16) (current_ptr +
1257 sizeof(struct ieee_types_header) -
1258 bss_entry->beacon_buf);
1259 break;
1260 case WLAN_EID_HT_INFORMATION:
1261 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1262 (current_ptr +
1263 sizeof(struct ieee_types_header));
1264 bss_entry->ht_info_offset = (u16) (current_ptr +
1265 sizeof(struct ieee_types_header) -
1266 bss_entry->beacon_buf);
1267 break;
1268 case WLAN_EID_BSS_COEX_2040:
1269 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1270 sizeof(struct ieee_types_header));
1271 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1272 sizeof(struct ieee_types_header) -
1273 bss_entry->beacon_buf);
1274 break;
1275 case WLAN_EID_EXT_CAPABILITY:
1276 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1277 sizeof(struct ieee_types_header));
1278 bss_entry->ext_cap_offset = (u16) (current_ptr +
1279 sizeof(struct ieee_types_header) -
1280 bss_entry->beacon_buf);
1281 break;
5e6e3a92
BZ
1282 default:
1283 break;
1284 }
1285
1286 current_ptr += element_len + 2;
1287
1288 /* Need to account for IE ID and IE Len */
7c6fa2a8 1289 bytes_left -= (element_len + 2);
5e6e3a92 1290
7c6fa2a8 1291 } /* while (bytes_left > 2) */
5e6e3a92
BZ
1292 return ret;
1293}
1294
5e6e3a92
BZ
1295/*
1296 * This function converts radio type scan parameter to a band configuration
1297 * to be used in join command.
1298 */
1299static u8
1300mwifiex_radio_type_to_band(u8 radio_type)
1301{
5e6e3a92
BZ
1302 switch (radio_type) {
1303 case HostCmd_SCAN_RADIO_TYPE_A:
636c4598 1304 return BAND_A;
5e6e3a92
BZ
1305 case HostCmd_SCAN_RADIO_TYPE_BG:
1306 default:
636c4598 1307 return BAND_G;
5e6e3a92 1308 }
5e6e3a92
BZ
1309}
1310
5e6e3a92
BZ
1311/*
1312 * This is an internal function used to start a scan based on an input
1313 * configuration.
1314 *
1315 * This uses the input user scan configuration information when provided in
1316 * order to send the appropriate scan commands to firmware to populate or
1317 * update the internal driver scan table.
1318 */
1319int mwifiex_scan_networks(struct mwifiex_private *priv,
600f5d90 1320 const struct mwifiex_user_scan_cfg *user_scan_in)
5e6e3a92
BZ
1321{
1322 int ret = 0;
1323 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1324 struct cmd_ctrl_node *cmd_node;
1325 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
5e6e3a92
BZ
1326 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1327 u32 buf_size;
1328 struct mwifiex_chan_scan_param_set *scan_chan_list;
5e6e3a92
BZ
1329 u8 filtered_scan;
1330 u8 scan_current_chan_only;
1331 u8 max_chan_per_scan;
1332 unsigned long flags;
1333
600f5d90 1334 if (adapter->scan_processing) {
5e6e3a92
BZ
1335 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1336 return ret;
1337 }
1338
1339 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1340 adapter->scan_processing = true;
1341 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1342
600f5d90 1343 if (priv->scan_block) {
5e6e3a92
BZ
1344 dev_dbg(adapter->dev,
1345 "cmd: Scan is blocked during association...\n");
1346 return ret;
1347 }
1348
1349 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1350 GFP_KERNEL);
1351 if (!scan_cfg_out) {
1352 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
b53575ec 1353 return -ENOMEM;
5e6e3a92
BZ
1354 }
1355
1356 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1357 MWIFIEX_USER_SCAN_CHAN_MAX;
1358 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1359 if (!scan_chan_list) {
1360 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1361 kfree(scan_cfg_out);
b53575ec 1362 return -ENOMEM;
5e6e3a92
BZ
1363 }
1364
5e6e3a92
BZ
1365 mwifiex_scan_setup_scan_config(priv, user_scan_in,
1366 &scan_cfg_out->config, &chan_list_out,
1367 scan_chan_list, &max_chan_per_scan,
1368 &filtered_scan, &scan_current_chan_only);
1369
600f5d90
AK
1370 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1371 &scan_cfg_out->config, chan_list_out,
1372 scan_chan_list);
5e6e3a92
BZ
1373
1374 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1375 if (!ret) {
1376 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1377 if (!list_empty(&adapter->scan_pending_q)) {
1378 cmd_node = list_first_entry(&adapter->scan_pending_q,
1379 struct cmd_ctrl_node, list);
1380 list_del(&cmd_node->list);
1381 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1382 flags);
1383 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1384 true);
1385 } else {
1386 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1387 flags);
1388 }
5e6e3a92
BZ
1389 } else {
1390 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1391 adapter->scan_processing = true;
1392 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1393 }
1394
1395 kfree(scan_cfg_out);
1396 kfree(scan_chan_list);
1397 return ret;
1398}
1399
1400/*
1401 * This function prepares a scan command to be sent to the firmware.
1402 *
1403 * This uses the scan command configuration sent to the command processing
1404 * module in command preparation stage to configure a scan command structure
1405 * to send to firmware.
1406 *
1407 * The fixed fields specifying the BSS type and BSSID filters as well as a
1408 * variable number/length of TLVs are sent in the command to firmware.
1409 *
1410 * Preparation also includes -
1411 * - Setting command ID, and proper size
1412 * - Ensuring correct endian-ness
1413 */
a5ffddb7
AK
1414int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1415 struct mwifiex_scan_cmd_config *scan_cfg)
5e6e3a92
BZ
1416{
1417 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
5e6e3a92
BZ
1418
1419 /* Set fixed field variables in scan command */
1420 scan_cmd->bss_mode = scan_cfg->bss_mode;
1421 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1422 sizeof(scan_cmd->bssid));
1423 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1424
1425 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1426
1427 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1428 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1429 + sizeof(scan_cmd->bssid)
1430 + scan_cfg->tlv_buf_len + S_DS_GEN));
1431
1432 return 0;
1433}
1434
7c6fa2a8
AK
1435/*
1436 * This function checks compatibility of requested network with current
1437 * driver settings.
1438 */
1439int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1440 struct mwifiex_bssdescriptor *bss_desc)
1441{
1442 int ret = -1;
1443
1444 if (!bss_desc)
1445 return -1;
1446
1447 if ((mwifiex_get_cfp_by_band_and_channel_from_cfg80211(priv,
1448 (u8) bss_desc->bss_band, (u16) bss_desc->channel))) {
1449 switch (priv->bss_mode) {
1450 case NL80211_IFTYPE_STATION:
1451 case NL80211_IFTYPE_ADHOC:
1452 ret = mwifiex_is_network_compatible(priv, bss_desc,
1453 priv->bss_mode);
1454 if (ret)
1455 dev_err(priv->adapter->dev, "cannot find ssid "
1456 "%s\n", bss_desc->ssid.ssid);
1457 break;
1458 default:
1459 ret = 0;
1460 }
1461 }
1462
1463 return ret;
1464}
1465
1466static int
5116f3ce
AK
1467mwifiex_update_curr_bss_params(struct mwifiex_private *priv, u8 *bssid,
1468 s32 rssi, const u8 *ie_buf, size_t ie_len,
1469 u16 beacon_period, u16 cap_info_bitmap, u8 band)
7c6fa2a8
AK
1470{
1471 struct mwifiex_bssdescriptor *bss_desc = NULL;
1472 int ret;
1473 unsigned long flags;
1474 u8 *beacon_ie;
1475
1476 /* Allocate and fill new bss descriptor */
1477 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1478 GFP_KERNEL);
1479 if (!bss_desc) {
1480 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1481 return -ENOMEM;
1482 }
5982b47a
YAP
1483
1484 beacon_ie = kmemdup(ie_buf, ie_len, GFP_KERNEL);
f7503230
JL
1485 if (!beacon_ie) {
1486 dev_err(priv->adapter->dev, " failed to alloc beacon_ie\n");
7c6fa2a8
AK
1487 return -ENOMEM;
1488 }
7c6fa2a8
AK
1489
1490 ret = mwifiex_fill_new_bss_desc(priv, bssid, rssi, beacon_ie,
1491 ie_len, beacon_period,
5116f3ce 1492 cap_info_bitmap, band, bss_desc);
7c6fa2a8
AK
1493 if (ret)
1494 goto done;
1495
1496 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1497 if (ret)
1498 goto done;
1499
1500 /* Update current bss descriptor parameters */
1501 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1502 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1503 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1504 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1505 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1506 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1507 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1508 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1509 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1510 0;
1511 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1512 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1513 0;
1514 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1515 NULL;
1516 priv->curr_bss_params.bss_descriptor.
1517 bss_co_2040_offset = 0;
1518 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1519 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1520 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1521 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1522 0;
1523
1524 /* Make a copy of current BSSID descriptor */
1525 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1526 sizeof(priv->curr_bss_params.bss_descriptor));
1527 mwifiex_save_curr_bcn(priv);
1528 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1529
1530done:
1531 kfree(bss_desc);
1532 kfree(beacon_ie);
1533 return 0;
1534}
1535
5116f3ce
AK
1536static void mwifiex_free_bss_priv(struct cfg80211_bss *bss)
1537{
1538 kfree(bss->priv);
1539}
1540
5e6e3a92
BZ
1541/*
1542 * This function handles the command response of scan.
1543 *
1544 * The response buffer for the scan command has the following
1545 * memory layout:
1546 *
1547 * .-------------------------------------------------------------.
1548 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1549 * .-------------------------------------------------------------.
1550 * | BufSize (t_u16) : sizeof the BSS Description data |
1551 * .-------------------------------------------------------------.
1552 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1553 * .-------------------------------------------------------------.
1554 * | BSSDescription data (variable, size given in BufSize) |
1555 * .-------------------------------------------------------------.
1556 * | TLV data (variable, size calculated using Header->Size, |
1557 * | BufSize and sizeof the fixed fields above) |
1558 * .-------------------------------------------------------------.
1559 */
1560int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
600f5d90 1561 struct host_cmd_ds_command *resp)
5e6e3a92
BZ
1562{
1563 int ret = 0;
1564 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1565 struct cmd_ctrl_node *cmd_node;
1566 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
5e6e3a92
BZ
1567 struct mwifiex_ie_types_data *tlv_data;
1568 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1569 u8 *bss_info;
1570 u32 scan_resp_size;
1571 u32 bytes_left;
5e6e3a92
BZ
1572 u32 idx;
1573 u32 tlv_buf_size;
5e6e3a92
BZ
1574 struct mwifiex_chan_freq_power *cfp;
1575 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1576 struct chan_band_param_set *chan_band;
5e6e3a92
BZ
1577 u8 is_bgscan_resp;
1578 unsigned long flags;
5116f3ce 1579 struct cfg80211_bss *bss;
5e6e3a92
BZ
1580
1581 is_bgscan_resp = (le16_to_cpu(resp->command)
1582 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1583 if (is_bgscan_resp)
1584 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1585 else
1586 scan_rsp = &resp->params.scan_resp;
1587
1588
67a50035 1589 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
5e6e3a92
BZ
1590 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1591 scan_rsp->number_of_sets);
1592 ret = -1;
1593 goto done;
1594 }
1595
1596 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1597 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1598 bytes_left);
1599
1600 scan_resp_size = le16_to_cpu(resp->size);
1601
1602 dev_dbg(adapter->dev,
1603 "info: SCAN_RESP: returned %d APs before parsing\n",
1604 scan_rsp->number_of_sets);
1605
5e6e3a92
BZ
1606 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1607
1608 /*
1609 * The size of the TLV buffer is equal to the entire command response
1610 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1611 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1612 * response header (S_DS_GEN)
1613 */
1614 tlv_buf_size = scan_resp_size - (bytes_left
1615 + sizeof(scan_rsp->bss_descript_size)
1616 + sizeof(scan_rsp->number_of_sets)
1617 + S_DS_GEN);
1618
1619 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1620 bss_desc_and_tlv_buffer +
1621 bytes_left);
1622
1623 /* Search the TLV buffer space in the scan response for any valid
1624 TLVs */
1625 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1626 TLV_TYPE_TSFTIMESTAMP,
1627 (struct mwifiex_ie_types_data **)
1628 &tsf_tlv);
1629
1630 /* Search the TLV buffer space in the scan response for any valid
1631 TLVs */
1632 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1633 TLV_TYPE_CHANNELBANDLIST,
1634 (struct mwifiex_ie_types_data **)
1635 &chan_band_tlv);
1636
5e6e3a92 1637 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
7c6fa2a8
AK
1638 u8 bssid[ETH_ALEN];
1639 s32 rssi;
1640 const u8 *ie_buf;
1641 size_t ie_len;
1642 int channel = -1;
1643 u64 network_tsf = 0;
1644 u16 beacon_size = 0;
1645 u32 curr_bcn_bytes;
1646 u32 freq;
1647 u16 beacon_period;
1648 u16 cap_info_bitmap;
1649 u8 *current_ptr;
1650 struct mwifiex_bcn_param *bcn_param;
1651
1652 if (bytes_left >= sizeof(beacon_size)) {
1653 /* Extract & convert beacon size from command buffer */
1654 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1655 bytes_left -= sizeof(beacon_size);
1656 bss_info += sizeof(beacon_size);
5e6e3a92
BZ
1657 }
1658
7c6fa2a8
AK
1659 if (!beacon_size || beacon_size > bytes_left) {
1660 bss_info += bytes_left;
1661 bytes_left = 0;
1662 return -1;
1663 }
5e6e3a92 1664
7c6fa2a8
AK
1665 /* Initialize the current working beacon pointer for this BSS
1666 * iteration */
1667 current_ptr = bss_info;
1668
1669 /* Advance the return beacon pointer past the current beacon */
1670 bss_info += beacon_size;
1671 bytes_left -= beacon_size;
1672
1673 curr_bcn_bytes = beacon_size;
1674
1675 /*
1676 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1677 * and capability information
1678 */
1679 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1680 dev_err(adapter->dev, "InterpretIE: not enough bytes left\n");
1681 continue;
1682 }
1683 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1684 current_ptr += sizeof(*bcn_param);
1685 curr_bcn_bytes -= sizeof(*bcn_param);
1686
1687 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1688
1689 rssi = (s32) (bcn_param->rssi);
1690 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%02X\n",
1691 rssi);
1692
1693 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1694
1695 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1696 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1697 cap_info_bitmap);
1698
1699 /* Rest of the current buffer are IE's */
1700 ie_buf = current_ptr;
1701 ie_len = curr_bcn_bytes;
1702 dev_dbg(adapter->dev, "info: InterpretIE: IELength for this AP"
1703 " = %d\n", curr_bcn_bytes);
1704
1705 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1706 u8 element_id, element_len;
1707
1708 element_id = *current_ptr;
1709 element_len = *(current_ptr + 1);
1710 if (curr_bcn_bytes < element_len +
1711 sizeof(struct ieee_types_header)) {
1712 dev_err(priv->adapter->dev, "%s: in processing"
1713 " IE, bytes left < IE length\n",
1714 __func__);
1715 goto done;
5e6e3a92 1716 }
7c6fa2a8
AK
1717 if (element_id == WLAN_EID_DS_PARAMS) {
1718 channel = *(u8 *) (current_ptr +
1719 sizeof(struct ieee_types_header));
5e6e3a92
BZ
1720 break;
1721 }
7c6fa2a8
AK
1722
1723 current_ptr += element_len +
1724 sizeof(struct ieee_types_header);
1725 curr_bcn_bytes -= element_len +
1726 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1727 }
1728
5e6e3a92
BZ
1729 /*
1730 * If the TSF TLV was appended to the scan results, save this
1731 * entry's TSF value in the networkTSF field.The networkTSF is
1732 * the firmware's TSF value at the time the beacon or probe
1733 * response was received.
1734 */
7c6fa2a8
AK
1735 if (tsf_tlv)
1736 memcpy(&network_tsf,
1737 &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1738 sizeof(network_tsf));
1739
1740 if (channel != -1) {
1741 struct ieee80211_channel *chan;
1742 u8 band;
1743
1744 band = BAND_G;
1745 if (chan_band_tlv) {
1746 chan_band =
1747 &chan_band_tlv->chan_band_param[idx];
1748 band = mwifiex_radio_type_to_band(
1749 chan_band->radio_type
1750 & (BIT(0) | BIT(1)));
1751 }
5e6e3a92 1752
7c6fa2a8
AK
1753 cfp = mwifiex_get_cfp_by_band_and_channel_from_cfg80211(
1754 priv, (u8)band, (u16)channel);
5e6e3a92 1755
7c6fa2a8 1756 freq = cfp ? cfp->freq : 0;
5e6e3a92 1757
7c6fa2a8 1758 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
5e6e3a92 1759
7c6fa2a8 1760 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
5116f3ce
AK
1761 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1762 chan, bssid, network_tsf,
1763 cap_info_bitmap, beacon_period,
1764 ie_buf, ie_len, rssi, GFP_KERNEL);
1765 *(u8 *)bss->priv = band;
1766 bss->free_priv = mwifiex_free_bss_priv;
5e6e3a92 1767
7c6fa2a8
AK
1768 if (priv->media_connected && !memcmp(bssid,
1769 priv->curr_bss_params.bss_descriptor
1770 .mac_address, ETH_ALEN))
1771 mwifiex_update_curr_bss_params(priv,
1772 bssid, rssi, ie_buf,
1773 ie_len, beacon_period,
5116f3ce 1774 cap_info_bitmap, band);
7c6fa2a8
AK
1775 }
1776 } else {
1777 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1778 }
1779 }
5e6e3a92
BZ
1780
1781 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1782 if (list_empty(&adapter->scan_pending_q)) {
1783 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1784 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1785 adapter->scan_processing = false;
1786 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
5e6e3a92
BZ
1787
1788 /* Need to indicate IOCTL complete */
600f5d90
AK
1789 if (adapter->curr_cmd->wait_q_enabled) {
1790 adapter->cmd_wait_q.status = 0;
1791 mwifiex_complete_cmd(adapter);
5e6e3a92
BZ
1792 }
1793 if (priv->report_scan_result)
1794 priv->report_scan_result = false;
1795 if (priv->scan_pending_on_block) {
1796 priv->scan_pending_on_block = false;
1797 up(&priv->async_sem);
1798 }
1799
1800 } else {
1801 /* Get scan command from scan_pending_q and put to
1802 cmd_pending_q */
1803 cmd_node = list_first_entry(&adapter->scan_pending_q,
1804 struct cmd_ctrl_node, list);
1805 list_del(&cmd_node->list);
1806 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1807
1808 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1809 }
1810
1811done:
5e6e3a92
BZ
1812 return ret;
1813}
1814
1815/*
1816 * This function prepares command for background scan query.
1817 *
1818 * Preparation includes -
1819 * - Setting command ID and proper size
1820 * - Setting background scan flush parameter
1821 * - Ensuring correct endian-ness
1822 */
572e8f3e 1823int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
5e6e3a92
BZ
1824{
1825 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1826 &cmd->params.bg_scan_query;
1827
1828 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1829 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1830 + S_DS_GEN);
1831
1832 bg_query->flush = 1;
1833
1834 return 0;
1835}
1836
5e6e3a92
BZ
1837/*
1838 * This function inserts scan command node to the scan pending queue.
1839 */
1840void
1841mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1842 struct cmd_ctrl_node *cmd_node)
1843{
1844 struct mwifiex_adapter *adapter = priv->adapter;
1845 unsigned long flags;
1846
600f5d90 1847 cmd_node->wait_q_enabled = true;
5e6e3a92
BZ
1848 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1849 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1850 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1851}
1852
5e6e3a92
BZ
1853/*
1854 * This function sends a scan command for all available channels to the
1855 * firmware, filtered on a specific SSID.
1856 */
1857static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
600f5d90 1858 struct mwifiex_802_11_ssid *req_ssid)
5e6e3a92
BZ
1859{
1860 struct mwifiex_adapter *adapter = priv->adapter;
1861 int ret = 0;
1862 struct mwifiex_user_scan_cfg *scan_cfg;
1863
1864 if (!req_ssid)
1865 return -1;
1866
600f5d90 1867 if (adapter->scan_processing) {
5e6e3a92
BZ
1868 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1869 return ret;
1870 }
1871
600f5d90 1872 if (priv->scan_block) {
5e6e3a92
BZ
1873 dev_dbg(adapter->dev,
1874 "cmd: Scan is blocked during association...\n");
1875 return ret;
1876 }
1877
5e6e3a92
BZ
1878 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1879 if (!scan_cfg) {
1880 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
b53575ec 1881 return -ENOMEM;
5e6e3a92
BZ
1882 }
1883
1884 memcpy(scan_cfg->ssid_list[0].ssid, req_ssid->ssid,
1885 req_ssid->ssid_len);
5e6e3a92 1886
600f5d90 1887 ret = mwifiex_scan_networks(priv, scan_cfg);
5e6e3a92
BZ
1888
1889 kfree(scan_cfg);
1890 return ret;
1891}
1892
1893/*
1894 * Sends IOCTL request to start a scan.
1895 *
1896 * This function allocates the IOCTL request buffer, fills it
1897 * with requisite parameters and calls the IOCTL handler.
1898 *
1899 * Scan command can be issued for both normal scan and specific SSID
1900 * scan, depending upon whether an SSID is provided or not.
1901 */
600f5d90 1902int mwifiex_request_scan(struct mwifiex_private *priv,
5e6e3a92
BZ
1903 struct mwifiex_802_11_ssid *req_ssid)
1904{
270e58e8 1905 int ret;
5e6e3a92
BZ
1906
1907 if (down_interruptible(&priv->async_sem)) {
1908 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1909 __func__);
1910 return -1;
1911 }
1912 priv->scan_pending_on_block = true;
1913
600f5d90 1914 priv->adapter->cmd_wait_q.condition = false;
5e6e3a92
BZ
1915
1916 if (req_ssid && req_ssid->ssid_len != 0)
1917 /* Specific SSID scan */
600f5d90 1918 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
5e6e3a92
BZ
1919 else
1920 /* Normal scan */
600f5d90
AK
1921 ret = mwifiex_scan_networks(priv, NULL);
1922
1923 if (!ret)
1924 ret = mwifiex_wait_queue_complete(priv->adapter);
1925
5e6e3a92
BZ
1926 if (ret == -1) {
1927 priv->scan_pending_on_block = false;
1928 up(&priv->async_sem);
1929 }
600f5d90 1930
5e6e3a92
BZ
1931 return ret;
1932}
1933
1934/*
1935 * This function appends the vendor specific IE TLV to a buffer.
1936 */
1937int
1938mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1939 u16 vsie_mask, u8 **buffer)
1940{
1941 int id, ret_len = 0;
1942 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1943
1944 if (!buffer)
1945 return 0;
1946 if (!(*buffer))
1947 return 0;
1948
1949 /*
1950 * Traverse through the saved vendor specific IE array and append
1951 * the selected(scan/assoc/adhoc) IE as TLV to the command
1952 */
1953 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1954 if (priv->vs_ie[id].mask & vsie_mask) {
1955 vs_param_set =
1956 (struct mwifiex_ie_types_vendor_param_set *)
1957 *buffer;
1958 vs_param_set->header.type =
1959 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1960 vs_param_set->header.len =
1961 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1962 & 0x00FF) + 2);
1963 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1964 le16_to_cpu(vs_param_set->header.len));
1965 *buffer += le16_to_cpu(vs_param_set->header.len) +
1966 sizeof(struct mwifiex_ie_types_header);
1967 ret_len += le16_to_cpu(vs_param_set->header.len) +
1968 sizeof(struct mwifiex_ie_types_header);
1969 }
1970 }
1971 return ret_len;
1972}
1973
1974/*
1975 * This function saves a beacon buffer of the current BSS descriptor.
1976 *
1977 * The current beacon buffer is saved so that it can be restored in the
1978 * following cases that makes the beacon buffer not to contain the current
1979 * ssid's beacon buffer.
1980 * - The current ssid was not found somehow in the last scan.
1981 * - The current ssid was the last entry of the scan table and overloaded.
1982 */
1983void
1984mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1985{
1986 struct mwifiex_bssdescriptor *curr_bss =
1987 &priv->curr_bss_params.bss_descriptor;
1988
030fe797
AK
1989 if (!curr_bss->beacon_buf_size)
1990 return;
5e6e3a92 1991
030fe797
AK
1992 /* allocate beacon buffer at 1st time; or if it's size has changed */
1993 if (!priv->curr_bcn_buf ||
1994 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
5e6e3a92 1995 priv->curr_bcn_size = curr_bss->beacon_buf_size;
5e6e3a92 1996
030fe797 1997 kfree(priv->curr_bcn_buf);
5982b47a 1998 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
5e6e3a92
BZ
1999 GFP_KERNEL);
2000 if (!priv->curr_bcn_buf) {
2001 dev_err(priv->adapter->dev,
2002 "failed to alloc curr_bcn_buf\n");
030fe797 2003 return;
5e6e3a92
BZ
2004 }
2005 }
030fe797
AK
2006
2007 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
2008 curr_bss->beacon_buf_size);
2009 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2010 priv->curr_bcn_size);
7c6fa2a8
AK
2011
2012 curr_bss->beacon_buf = priv->curr_bcn_buf;
2013
2014 /* adjust the pointers in the current BSS descriptor */
2015 if (curr_bss->bcn_wpa_ie)
2016 curr_bss->bcn_wpa_ie =
2017 (struct ieee_types_vendor_specific *)
2018 (curr_bss->beacon_buf +
2019 curr_bss->wpa_offset);
2020
2021 if (curr_bss->bcn_rsn_ie)
2022 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2023 (curr_bss->beacon_buf +
2024 curr_bss->rsn_offset);
2025
2026 if (curr_bss->bcn_ht_cap)
2027 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2028 (curr_bss->beacon_buf +
2029 curr_bss->ht_cap_offset);
2030
2031 if (curr_bss->bcn_ht_info)
2032 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2033 (curr_bss->beacon_buf +
2034 curr_bss->ht_info_offset);
2035
2036 if (curr_bss->bcn_bss_co_2040)
2037 curr_bss->bcn_bss_co_2040 =
2038 (u8 *) (curr_bss->beacon_buf +
2039 curr_bss->bss_co_2040_offset);
2040
2041 if (curr_bss->bcn_ext_cap)
2042 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2043 curr_bss->ext_cap_offset);
5e6e3a92
BZ
2044}
2045
2046/*
2047 * This function frees the current BSS descriptor beacon buffer.
2048 */
2049void
2050mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2051{
2052 kfree(priv->curr_bcn_buf);
2053 priv->curr_bcn_buf = NULL;
2054}